2023
DOI: 10.1109/tse.2023.3235684
|View full text |Cite
|
Sign up to set email alerts
|

DASP: A Framework for Driving the Adoption of Software Security Practices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 46 publications
0
6
0
Order By: Relevance
“…A study in [139] offers support for developers and tool recommendations, containing much valuable practitioner experience, but little objective assessment of the advice provided. On the other hand, seven considerations(categories) that organizations and stakeholdersneed to pay attention to in order to foster the adoption of software security practices by developers have been highlighted in [8]. Figure 3 shows this list of these seven categories.…”
Section: Figure 2 Threat Modeling Process [61]mentioning
confidence: 99%
See 3 more Smart Citations
“…A study in [139] offers support for developers and tool recommendations, containing much valuable practitioner experience, but little objective assessment of the advice provided. On the other hand, seven considerations(categories) that organizations and stakeholdersneed to pay attention to in order to foster the adoption of software security practices by developers have been highlighted in [8]. Figure 3 shows this list of these seven categories.…”
Section: Figure 2 Threat Modeling Process [61]mentioning
confidence: 99%
“…Figure 3 Consideration to foster the adoption of software security practices [8] In order to better understand SSDLC, there is need to analyze the existing SSDLC models. These models include System security engineering capability maturity model (SSE-CMM), Microsoft security development lifecycle (MS-SDL) and Software assurance maturity model (SAMM).…”
Section: Figure 2 Threat Modeling Process [61]mentioning
confidence: 99%
See 2 more Smart Citations
“…Coding Practices Focus on writing code that is resistant to various types of attacks. Includes proper input validation, output sanitization, secure error handling, secure memory management, and protection against common vulnerabilities such as injection attacks, cross-site scripting (XSS), and buffer overflows [156].…”
Section: Securementioning
confidence: 99%